Sciweavers

912 search results - page 87 / 183
» Anomaly
Sort
View
APNOMS
2006
Springer
14 years 19 days ago
Signature-Aware Traffic Monitoring with IPFIX
Traffic monitoring is essential for accounting user traffic and detecting anomaly traffic such as Internet worms or P2P file sharing applications. Since typical Internet traffic mo...
Youngseok Lee, Seongho Shin, Taeck-Geun Kwon
CCS
2008
ACM
13 years 11 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
CSREASAM
2006
13 years 10 months ago
Firewall Rules Analysis
- In this paper, we propose a method to analyze the firewall policy or rule-set using Relational Algebra and Raining 2D-Box Model. It can discover all the anomalies in the firewall...
Thawatchai Chomsiri, Chotipat Pornavalai
IADIS
2004
13 years 10 months ago
A note on the distribution of packet arrivals in high-speed data networks
A simple explanation is given of an anomaly often detected in traffic measurement when packet timings are truncated to nearest whole numbers. The correct observed discrete distrib...
Vic Grout, Stuart Cunningham, Denise Oram, Rich He...
IJCAI
2001
13 years 10 months ago
Acquisition of Ontological Knowledge from Canonical Documents
This paper describes experiences with quasiautomated creation of a computational ontology for maritime information from a mixed collection of source material. Based on these exper...
Raphael M. Malyankar